SOLUTIONS GRADED A+
✔✔The intrusion detection system, in which a pattern of radio waves is transmitted and
partially reflected back to the antenna using the doppler effect is known as -
✔✔Microwave system
✔✔The type of lock generally used on automobiles, desks and cabinets is - ✔✔Wafer
✔✔inventories of keys should be conducted at least - ✔✔annually
✔✔UL classified safes must be anchored to the floor or weight at least - ✔✔750 pds
✔✔The temperatures and humidities at which paper, magnetic strips and floppy discs
may be destroyed are what, which equals the UL Class? - ✔✔350 degrees at 65%
humidity and 150 and 125 degrees for magnetic tapes and floppy discs at 80%
humidity.
✔✔The mechanical lock longest in use which has practically no security value - ✔✔The
warded lock
✔✔The most widely used lock for building doors and rooms - ✔✔Pin tumbler lock
✔✔Foil used as a detector on a glass window to signal a surreptitious or forcible
penetration is - ✔✔Elector mechanical sensor
✔✔Security services in which the security force is hired and controlled directly by the
protected organization are called what? - ✔✔Proprietary.
✔✔What is lost by using a contract security service - ✔✔Control and organization
knowledge.
✔✔The most common perimeter barriers are? - ✔✔Fencing and walls.
✔✔What is designed to control pedestrian traffic and minimize tailgating/piggybacking?
- ✔✔Turnstiles
✔✔What are the 4 key factors in site hardening a facility? - ✔✔1) Stand off distance, the
distance between the asset and nearest point of attack - usually explosion, 2) Structural
integrity, 3) Prevention of progressive collapse, 4) redundancy of operating systems.
,✔✔An adversary may use what 3 types of attacks to defeat an access control point: -
✔✔1) Deceit using false pretenses, 2) Direct physical attack, 3) Technical attack like
forging a badge.
✔✔What are 3 general factors to consider when defining a camera's field of view
requirements? - ✔✔1) Target, 2) activity, 3) purpose
✔✔What are the 4 major types of video surveillance cameras? - ✔✔1) Analog, 2) IP, 3)
Infrared, 4) Thermal.
✔✔A general statement of a principle, approve by senior leaders, according to which an
organization performs business functions is a... - ✔✔Policy.
✔✔Detailed implementation instructions, which may change frequently, for staff to carry
out security policies are... - ✔✔Procedures.
✔✔Presidential directive establishes a policy for a common identification standard for
federal employees and contractors. - ✔✔HSPD-12
✔✔Three parts of the fire triangle - ✔✔Oxygen, heat, fuel
✔✔Theft occurs when what 3 elements are present? The Theft Triangle: - ✔✔1) motive,
2) desire, 3) opportunity
✔✔A barrier is normally considered penetrated when and adversary reaches: - ✔✔3
feet beyond the barrier
✔✔A business impact analysis is conducted during which BCP step? - ✔✔Readiness
✔✔Vulnerability Definition. - ✔✔A weaknesses of an organization that can be exploited
by an adversary that make an asset susceptible to a threat.
✔✔A characteristic that identifies the levels needed to achieve specific objectives under
a given set of conditions - ✔✔A requirement
✔✔Risk analysis is conducted during which PPS life cycle phase? - ✔✔Planning.
✔✔What are 8 major outputs of the Design & Estimation Phase? - ✔✔1) Contract
evaluation criteria, 2) bidder instructions or bid package which packages most of these,
3) system specs, 4) drawings, 5) final SoW, 6) operational procedures. Then for
Estimation, 7) Budget, Prelim, Final and Life Cycle estimates, 8) implementation
schedule.
, ✔✔The job of managing a project involves five basic functions: - ✔✔1) Planning, 2)
organizing, 3) directing, 4) coordinating, 5) controlling.
✔✔A structure that extends higher than the maximum reach of available fire fighting
equipment, generally 75-100 feet. - ✔✔High rise
✔✔What are the 3 operating modes of a high rise building? - ✔✔1) Open, 2) Closed, 3)
Hybrid.
✔✔Point Security Definition. - ✔✔Outer perimeter is loosely controlled with focus on
individual buildings.
✔✔Area Security Definition. - ✔✔Perimeter and entry portals, usually only one, have
higher control and security features.
✔✔Name 5 methods to Address Risk. - ✔✔1) Acceptance/Assumption 2) Avoidance 3)
Spreading/Limitation 4) Transfer 5) Reduction/Site Hardening.
✔✔What are the 6 general steps of Risk Assessment approach regardless of the model.
- ✔✔Value of assets, then threats, then vulnerabilities, then impact, then analysis which
may include prioritization, costs, and probability, then mitigation. This is a cyclical
process.
✔✔What are 3 types of Assets. - ✔✔1) Tangible 2) Intangible 3) Mixed
✔✔Name 3 ways to value an asset. - ✔✔1) Relative Value, low-high, 2) Total Cost of
Loss, K, equals Cp, permanent replacement cost + Ct, temporary replacement cost +
Cr, related costs like removal or installation + Ci, lost income -I, insurance, 3) Security
Risk Rating equals Asset Value x Threat Likelihood x Severity or impact x Vulnerability.
✔✔Hazard definition - ✔✔A condition that makes it more likely a peril will occur - for
example, mental illness. It is sometimes associated with nature.
✔✔Name 3 types of threats. - ✔✔1) Intentional or criminal, 2) natural or noncriminal 3)
inadvertent or consequential like strikes which includes peripheral threats.
✔✔What are two ways to measure vulnerability. - ✔✔1) Observability - adversary can
see the vulnerability 2) Exploitability - adversary can take advantage of vulnerability.
✔✔Impact is usually measured in what terms? - ✔✔Financial.
✔✔Evaluation levels for threat, vulnerability, and impact should be decided by who? -
✔✔Multi-disciplinary Team